Skip to main content

Detection of Copy-Move Forgery in Digital Image Based on SIFT Features and Automatic Matching Thresholds

  • Conference paper
  • First Online:
Applied Computing to Support Industry: Innovation and Technology (ACRIT 2019)

Abstract

Today the technology age is characterized by the spread of the digital images. It’s the most common form of information transmission whether through the internet or newspaper. This huge use of images technology has been accompanied by an evolution in editing tools which makes modifying and editing an image very simple. This paper proposes an effective and fast method for copy-move forgery detection. The paper adopts a SIFT technique for features extraction and wavelet technique to estimate the matching threshold. The low-frequency components are used to compute a dynamic threshold rather than a fixed threshold. Also, a method to remove false positive areas is proposed in order to produce the best possible results. The method can detect accurately and quickly the forgery even after more complex transformations. The experimental results refer that the proposed method can also detect forgery against post-processing operation and multiple copies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sivakumar, M., Roy, P., Harmsen, K., Saha, S.: Satellite remote sensing and GIS applications in agricultural meteorology. In: Paper Presented at: Proceedings of the Training Workshop in Dehradun, India. AGM-8, WMO/TD (2004)

    Google Scholar 

  2. Zandi, M., Mahmoudi-Aznaveh, A., Talebpour, A.: Iterative copy-move forgery detection based on a new interest point detector. IEEE Trans. Inf. Forensics Secur. 11(11), 2499–2512 (2016)

    Article  Google Scholar 

  3. Walia, S., Kumar, K.: Digital image forgery detection: a systematic scrutiny. Aust. J. Forensic Sci. 51, 1–39 (2018)

    Google Scholar 

  4. Shivakumar, B., Baboo, S.S.: Automated forensic method for copy-move forgery detection based on Harris interest points and SIFT descriptors. Int. J. Comput. Appl. 27(3), 9–17 (2011)

    Google Scholar 

  5. Parashar, N., Tiwari, N., Dubey, D.: A survey of digital image tampering techniques. Int. J. Sig. Process. Image Process. Pattern Recogn. 8(10), 91–96 (2015)

    Google Scholar 

  6. Sadeghi, S., Dadkhah, S., Jalab, H.A., Mazzola, G., Uliyan, D.: State of the art in passive digital image forgery detection: copy-move image forgery. Pattern Anal. Appl. 21(2), 291–306 (2018)

    Article  MathSciNet  Google Scholar 

  7. Panda, S., Mishra, M.: Passive techniques of digital image forgery detection: developments and challenges. In: Kalam, A., Das, S., Sharma, K. (eds.) Advances in Electronics, Communication and Computing. LNEE, vol. 443, pp. 281–290. Springer, Singapore (2018). https://doi.org/10.1007/978-981-10-4765-7_29

    Chapter  Google Scholar 

  8. Khayeat, A.: Copy-Move Forgery Detection in Digital Images. Cardiff University, Cardiff (2017)

    Google Scholar 

  9. Kaur, R., Zail, G., Kaur, A., Singh, G.Z.: A review of copy-move forgery detection techniques. Int. J. Comput. Sci. Inf. Technol. Secur. 6, 249–253 (2016)

    Google Scholar 

  10. Dixit, A., Gupta, R.: Copy-move image forgery detection using frequency-based techniques: a review. Int. J. Sig. Process. Image Process. Pattern Recogn. 9(3), 71–88 (2016)

    Google Scholar 

  11. Asghar, K., Habib, Z., Hussain, M.: Copy-move and splicing image forgery detection and localization techniques: a review. Aust. J. Forensic Sci. 49(3), 281–307 (2017)

    Article  Google Scholar 

  12. Qureshi, M.A., Deriche, M.: A bibliography of pixel-based blind image forgery detection techniques. Sig. Process. Image Commun. 39, 46–74 (2015)

    Article  Google Scholar 

  13. Li, Y.: Image copy-move forgery detection based on polar cosine transform and approximate nearest neighbor searching. Forensic Sci. Int. 224(1–3), 59–67 (2013)

    Article  Google Scholar 

  14. Warif, N.B.A., Wahab, A.W.A., Idris, M.Y.I., et al.: Copy-move forgery detection: survey, challenges and future directions. J. Netw. Comput. Appl. 75, 259–278 (2016)

    Article  Google Scholar 

  15. Bayram, S., Sencar, H.T., Memon, N.: A survey of copy-move forgery detection techniques. In: Paper Presented at: IEEE Western New York Image Processing Workshop (2008)

    Google Scholar 

  16. Zhao, J., Guo, J.: Passive forensics for copy-move image forgery using a method based on DCT and SVD. Forensic Sci. Int. 233(1–3), 158–166 (2013)

    Article  Google Scholar 

  17. AlSawadi, M., Muhammad, G., Hussain, M., Bebis, G.: Copy-move image forgery detection using local binary pattern and neighborhood clustering. In: Paper Presented at: 2013 European Modelling Symposium (2013)

    Google Scholar 

  18. Fadl, S.M., Semary, N.A.: A proposed accelerated image copy-move forgery detection. In: Paper Presented at: 2014 IEEE Visual Communications and Image Processing Conference (2014)

    Google Scholar 

  19. Lee, J.-C., Chang, C.-P., Chen, W.-K.: Detection of copy–move image forgery using histogram of orientated gradients. Inf. Sci. 321, 250–262 (2015)

    Article  Google Scholar 

  20. Khan, S., Kulkarni, A.: Robust method for detection of copy-move forgery in digital images. In: Paper Presented at: 2010 International Conference on Signal and Image Processing (2010)

    Google Scholar 

  21. Haimour, F.O., Khraiwesh, M.A., Mahmoud, K.W.: An improved method for detecting copy-move forgery in digital images, Zarqa University (2015)

    Google Scholar 

  22. Parihar, V., Mehtre, B.M.: Copy move forgery detection using key-points structure, Sardar Patel University of Police, Security and Criminal (2016)

    Google Scholar 

  23. Chen, L., Lu, W., Ni, J., Sun, W., Huang, J.: Region duplication detection based on Harris corner points and step sector statistics. J. Vis. Commun. Image Represent. 24(3), 244–254 (2013)

    Article  Google Scholar 

  24. Singh, R., Oberoi, A., Goel, N.: Copy move forgery detection on digital images. Int. J. Comput. Appl. 98(9), 17–22 (2014)

    Google Scholar 

  25. Sreelakshmy, I, Anver, J.: An improved method for copy-move forgery detection in digital forensic. In: Paper Presented at: 2016 Online International Conference on Green Engineering and Technologies (IC-GET) (2016)

    Google Scholar 

  26. Yang, B., Sun, X., Guo, H., Xia, Z., Chen, X.: A copy-move forgery detection method based on CMFD-SIFT. Multimed. Tools Appl. 77(1), 837–855 (2018)

    Article  Google Scholar 

  27. Lowe, D.G.: Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vis. 60(2), 91–110 (2004)

    Article  Google Scholar 

  28. Amerini, I., Ballan, L., Caldelli, R., Del Bimbo, A., Serra, G.: A sift-based forensic method for copy–move attack detection and transformation recovery. IEEE Trans. Inf. Forensics Secur. 6(3), 1099–1110 (2011)

    Article  Google Scholar 

  29. Tralic, D., Zupancic, I., Grgic, S., Grgic, M.: CoMoFoD—New database for copy-move forgery detection. In: Paper Presented at: Proceedings ELMAR-2013 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Muthana S. Mahdi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mahdi, M.S., Alsaad, S.N. (2020). Detection of Copy-Move Forgery in Digital Image Based on SIFT Features and Automatic Matching Thresholds. In: Khalaf, M., Al-Jumeily, D., Lisitsa, A. (eds) Applied Computing to Support Industry: Innovation and Technology. ACRIT 2019. Communications in Computer and Information Science, vol 1174. Springer, Cham. https://doi.org/10.1007/978-3-030-38752-5_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-38752-5_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-38751-8

  • Online ISBN: 978-3-030-38752-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics